Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-07-2023 08:10

General

  • Target

    0064a5e1fb383f45293db229e.dll

  • Size

    5.0MB

  • MD5

    7f429a8e660c28fa4465412a37fa4a4e

  • SHA1

    153b73e368b2e2355fa7999b053068cd8859b771

  • SHA256

    0064a5e1fb383f45293db229eacb793dce0e9a94a40778307b012f1c4c062b6b

  • SHA512

    2e622930fc3779f5ec5c9d9b6fda047d1a9e8781a39d25403f7a2e4b2e468badc0cd53f7624865fe6ce5bf2001030ac1e83c98b6fc8f3f251bcf7ad7648c00fd

  • SSDEEP

    49152:RnNQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA:1WqPoBhz1aRxcSUDk36SA

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3038) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 2 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0064a5e1fb383f45293db229e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0064a5e1fb383f45293db229e.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4808
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:4324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvr.exe

    Filesize

    2.2MB

    MD5

    defbf75977b0d61f8b2ee2e8cb91e1b5

    SHA1

    1c70b5b82eb25eda963a1d027175f90c3092c060

    SHA256

    71f62cd566bcc16dd3170efc888da5cd12be3910894e64efa5dd10d5405fc893

    SHA512

    e9af6452549d29d68407f094c97d9ffa1ea6257fde3e952646478fd19f129f4f4445046eab15899a320b46a8713b3da08e37af0de08ae357c9ba2e57365b0bf2

  • C:\Windows\mssecsvr.exe

    Filesize

    2.2MB

    MD5

    defbf75977b0d61f8b2ee2e8cb91e1b5

    SHA1

    1c70b5b82eb25eda963a1d027175f90c3092c060

    SHA256

    71f62cd566bcc16dd3170efc888da5cd12be3910894e64efa5dd10d5405fc893

    SHA512

    e9af6452549d29d68407f094c97d9ffa1ea6257fde3e952646478fd19f129f4f4445046eab15899a320b46a8713b3da08e37af0de08ae357c9ba2e57365b0bf2

  • C:\Windows\mssecsvr.exe

    Filesize

    2.2MB

    MD5

    defbf75977b0d61f8b2ee2e8cb91e1b5

    SHA1

    1c70b5b82eb25eda963a1d027175f90c3092c060

    SHA256

    71f62cd566bcc16dd3170efc888da5cd12be3910894e64efa5dd10d5405fc893

    SHA512

    e9af6452549d29d68407f094c97d9ffa1ea6257fde3e952646478fd19f129f4f4445046eab15899a320b46a8713b3da08e37af0de08ae357c9ba2e57365b0bf2